Solved

DOS Command line for PGP??

Posted on 2007-04-01
5
703 Views
Last Modified: 2011-10-03
Which version of PGP  is compatible for DOS command line.
Please provide an example of command to encrypt and sign using PGP command line.

Is it possible to Encrypt and sign 500 files through a batch program, each of this files' will be Encrypted using a different Public key.
0
Comment
Question by:mkhan900
  • 2
5 Comments
 
LVL 27

Expert Comment

by:Tolomir
ID: 18834525
Take a look at:

http://www.pgp.com/products/commandline/index.html

    * Easily integrate information security into existing automation scripts and backup systems.
    * Ensure confidential information is protected by strong encryption no matter where it resides.
    * Leverage existing infrastructure and work with business partners with support for OpenPGP keys, X.509 certificates, PGP Universal Server, and PGP keyservers.
    * Retain corporate recovery and access to encrypted data (according to policy) using patented PGP Additional Decryption Key (ADK) technology when a key is lost or when required by regulatory mandates.

Tolomir
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18834541
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
ID: 19153848
PAQed with no points refunded (of 125)

Computer101
EE Admin
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
A simple description of email encryption using a secure portal service. This is one of the choices offered by The Email Laundry for email encryption. The other choices are pdf encryption which creates an encrypted pdf of your email and any attachmen…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now